Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Library and Information Science

Halmos College Of Natural Sciences And Oceanography Annual Report: Fiscal Year 2019 And 2020, Keri Baker Oct 2021

Halmos College Of Natural Sciences And Oceanography Annual Report: Fiscal Year 2019 And 2020, Keri Baker

Alvin Sherman Library Brochures, Pamphlets, Reports

This report gathers information about items collected in Nova Southeastern University's institutional repository, NSUWorks, under the Halmos College of Natural Science and Oceanography community during the fiscal years 2019 and 2020. New Collections are highlighted and information about faculty and student scholarship uploaded to the Halmos community section of the repository are discussed. This report represents a subset of NSUWorks and does not reflect the overall body of work contained therein.


Unintended Uses Of A Journal Review System Within A Repository For Digital Tracking Of University Etds, Jaime M. Goldman, Keri Baker Mar 2021

Unintended Uses Of A Journal Review System Within A Repository For Digital Tracking Of University Etds, Jaime M. Goldman, Keri Baker

Staff Presentations, Proceedings, Lectures, and Symposia

The Nova Southeastern University (NSU) Oceanographic Campus Library has always had a unique challenge in that it is the final clearinghouse for student capstone, thesis, and dissertation binding and publication. The library has traditionally been the host of the final print publication and the liaison between the student, university program office, and the bindery. With the launch of NSUWorks, NSU’s institutional repository, 7 years ago, the library worked to develop an innovative and effective start to finish workflow for student Electronic Theses and Dissertations (ETDs) to change the physical lifecycle of NSU’s theses and dissertations into a virtual ETD lifecycle. …


Alsc Intellectual Freedom Programming Toolkit, Association For Library Service To Children (Alsc) Intellectual Freedom Committee Jan 2021

Alsc Intellectual Freedom Programming Toolkit, Association For Library Service To Children (Alsc) Intellectual Freedom Committee

Staff Publications

Meagan Albright co-contributed three sections in this toolkit:

  • Integrating Key Concepts in STORYTIME: Tips and Examples, p. 3
  • Integrating Key Concepts in STEAM: Tips and Examples, p.11
  • Integrating Key Concepts in OUTREACH: Tips and Examples, p.16.


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …


Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes Jan 2021

Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes

CCE Theses and Dissertations

With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo Jan 2021

Human Errors In Data Breaches: An Exploratory Configurational Analysis, Gabriel A. Cornejo

CCE Theses and Dissertations

Information Systems (IS) are critical for employee productivity and organizational success. Data breaches are on the rise—with thousands of data breaches accounting for billions of records breached and annual global cybersecurity costs projected to reach $10.5 trillion by 2025. A data breach is the unauthorized disclosure of sensitive information—and can be achieved intentionally or unintentionally. Significant causes of data breaches are hacking and human error; in some estimates, human error accounted for about a quarter of all data breaches in 2018. Furthermore, the significance of human error on data breaches is largely underrepresented, as hackers often capitalize on organizational users’ …